General

  • Target

    2024-04-20_e3f5067e401450c84a51d0645d744302_cryptolocker

  • Size

    50KB

  • MD5

    e3f5067e401450c84a51d0645d744302

  • SHA1

    0f2d1db1310f5fda3de2f2e775d46a8d28ec0865

  • SHA256

    c4d54d330e45c2f02ac1b55baaff5b2179846c2b5af07a599a4feb01d1ae1c4f

  • SHA512

    af786abd585a98d1be61f3757de5cddc915166e7bb8714e2c20e066ceee9fa782e222e45bee250f3a8035f4d199cb2c0401d4257233ed0cf199832183ad7d998

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtOP:bODOw9acifAoc+v8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_e3f5067e401450c84a51d0645d744302_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections